Data Security Round Up: Our top advice

October is National Cyber Security Awareness Month. In recognition, we're rounding up some of our top security blog posts and tips from the past few years. There is never a 100% guarantee when it comes to data security. But following the advice in these posts, along with implementing the right system, will certainly get you a lot closer.

Data Security Round Up Think you're up on your cyber security knowledge? Take this short quiz to test your knowledge.

Best Practices

Get Back to the Basics of Data Security

This post outlines basic data security best practices. We hope you're already following the advice covered in this post! But we get it - if you're not thinking about it every day, like we are, it can be easy to forget about data security. Read this as a refresher post and make it a goal to follow the tips every day.  Read Now

3 Common Security Threats and How to Stay Safe

In the post, we cover common security threats you face while out in public and what you can do to keep your data safe. Read this one if you travel for work or if you ever work outside the office (or if you connect to public Wi-Fi in your private time!). We cover threats like rogue access points and safety tips like two-factor authentication (also called dual factor authentication). Read Now

6 Tips to Keep Your Data Safe on Vacation

Like the name suggests, this post is about staying safe on vacation - but if you travel frequently for work, this advice applies to you, too! Read Now

How Secure Is Your Password?

If you've created a new password anytime recently, you were probably required to use a combination of numbers, letters and special characters. But that may not necessarily mean your password is secure. Read this post to find out some tips for creating a secure password and get links to test your password strength.  Read Now


Blocking the Cryptolocker Virus in Office 365

This is still one of our most popular blog posts. It was originally written in 2013 when the Cryptolocker malware first started getting attention and updated recently. It tells you how to block EXE file attachments (one of those popular ways to send malware) in Office 365. Read Now

Customizing Email to Protect Sensitive Data in Office 365

Learn about some of the built-in options for customization in Office 365 that you can use to protect your sensitive data. This post covers disclaimers, blocking domains and data loss prevention. These are especially useful for companies dealing with sensitive customer data or who regularly have to email customer information. Read Now

How To Protect Patient Data with Encrypted Email

This post covered encrypted email: How it works and what it will look like to your recipients. It's primarily geared towards the healthcare field but if your company deals with ANY sensitive data on a regular basis (credit cards, SSNs, legal information, etc), encrypted email is something you may want to look into. Read Now



Preventing Data Breaches with Mobile Device Security

This covers a few recent data breaches on iOS and Android platforms and covers mobile device policies. If your employees are using their phones or tablets for work (they probably are, even if you issued them a phone), this one is especially important for you.  Read Now



HIPAA, HITECH and Storing Sensitive Data in the Cloud

This post covers what you need to know about staying HIPAA and HITECH compliant and storing your inforamtion in the cloud. A common misconception is that the cloud isn't safe - but it can be! We talk about that, along with business agreements - necessary to HIPAA compliance. Read Now

Migrating Your Servers at the End of Service

If an old server doesn't sound like a security threat to you, then you need to read this post. Storing ANY information on a server that has reached end of service is a huge risk to your business. This post explains why it a risk and what the process is for migrating to a new system. Read Now


It's important to remember that just following the advice in these posts isn't enough to keep your business safe if you don't also have the right system in place. A firewall you bought a couple of years ago and haven't touched since isn't doing much to keep you safe. Data security threats are constantly evolving and your data security should be evolving with it. If you have any questions about data security, or just want a check on your current data security set up, please contact us.

Related Posts

how remote_devices_create_security_concerns
Laptops, Tablets, and Smartphones All Create Attack Paths to Your Network - Here's How Endpoint Security Blocks Them.
- Remote Devices Provide a Weak Link for Hackers to Exploit The internet of things (IoT) and...
Preventing Data Breaches with Mobile Device Security
- Recent data breaches for both iPhone and Android OS's highlight the need for businesses to...